May 22
Your GPS for the Identiverse Agenda

Andi Hindle | Content Chair, Identiverse

If you haven’t attended Identiverse before, the conference agenda can seem pretty daunting!  The detailed agenda on the website and on the mobile app, together with our agenda blog series, will help you find the topics that are most immediately of interest to you. But sometimes, it can be helpful to have a big picture […]

May 14
How to Plan for Enterprise and Customer/Consumer IAM Program Success

Todd Rossin | CEO & Chief Strategist, IDMWORKS

The challenges of securing your environment, specifically with identity and access management (IAM), continue to increase in scope and complexity. Yet, too many organizations are still trying to tackle IAM, whether it’s enterprise, customer or consumer focused, on a project-by-project basis. Fifteen plus years and thousands of customer engagements have taught us a lot of […]

May 08
Identiverse Content Countdown Series

Andi Hindle | Content Chair, Identiverse

  Part 1: IoT and Mobile Our Identiverse (and Cloud Identity Summit!) alumni know that we run a pretty packed conference agenda. Our tenth anniversary year is no different. There’s a lot going on in the industry! To help you navigate our high-quality, high-volume, high-energy week a little more easily—and to highlight some sessions that […]

April 23
It’s Identiverse Tweet Jam Time!

Andi Hindle | Content Chair, Identiverse

With barely two months remaining until Identiverse 2019, one of our absolute favorite traditions is right around the corner. It’s Tweet Jam time again! If you haven’t attended an Identiverse Tweet Jam before, you won’t want to miss out on the fast-typing flurry of hot identity topics. This hour-long Twitter event will give you a […]

March 06
The Evolving Identity Stack

John Fontana | Standards and Identity Analyst at Yubico

It has been said that the greatest thing about technology standards is that everyone has one. While the quip may elicit a chuckle, the goal of standards-based identity, authentication and authorization is no laughing matter. The best known and most widely used interoperable, cross-platform standard today for identity and account access is the username and […]

February 01
Achieving Strong Authentication at Scale with FIDO2

Andrew Shikiar | Chief Marketing Officer, FIDO Alliance

The FIDO Alliance mission to help the world move beyond passwords with simpler, stronger authentication has always been a somewhat audacious goal. The businesses that came together to form the alliance understood that replacing passwords for online authentication could only ever become commercially viable at scale through a combination of free and open technology standards […]

January 24
The Art and Science of Agenda Building

Andi Hindle | Identiverse Content Chair

We’ve had a few people ask us how the content selection process for Identiverse works. With the Identiverse 2019 Call for Presentations complete and the review and selection process now well underway, this seemed like a good time to provide a little more insight into the agenda-building effort.   The first step is to start […]

November 02
Updates from our Content Chair

Andi Hindle | Identiverse Content Chair

As I’m sure you’ve noticed, things have been busy on the identity front over the past few months. There are a few key themes emerging which I expect will continue to develop over the coming months, and which I’ll start to explore here. Given the volume of activity to choose from, though, there’s a good […]

November 01
Vectors of Trust

Justin Richer | Security Architect, Software Engineer, Standards Editor and Systems Designer

Anyone working in the identity industry will tell you that identity is difficult to define. Anyone who says it’s simple is trying to sell you their definition. Even harder than a universal definition, and perhaps more important, is a consistent means of measurement. People can still log in if we disagree on the details of […]

October 31
Chrome Puts Token Binding in a Bind

Brian Campbell | Distinguished Engineer, Ping Identity

Bearer tokens underlie the vast majority of online identity transactions engaged in by identity professionals and amateurs alike. A bearer token has the property that any party in possession of that token (i.e., the “bearer”) can use it to access any associated resources. No other proof beyond the simple possession of the token is needed […]

July 24
Consolidation Not Fragmentation, at Last!

Colin Wallis | Executive Director, Kantara Initiative

It’s hard to believe a month has gone by since the identerati converged on the Hynes Convention Center in Boston and emerged four days later as the ‘Identiversed’. I’m still emailing follow-ups, and receiving them too, as many folks took time out to celebrate the 4th of July the week following the event. These big […]

July 19
The State of the Authorization Union

David Brossard | VP Customer Relations, Axiomatics

A few weeks ago, I had the pleasure to talk at the European Identity Conference on a topic that is close to my heart: authorization. More specifically, I discussed how the evolving IT landscape requires an even finer grained authorization framework to be able to deliver value to consumers as a whole. In a later […]

1 2 3 5

Enter your details to receive email updates from Identiverse